Senior Security Specialist, Interagency Security Committee
Cybersecurity and Infrastructure Security Agency
Scott J. Dunford is a seasoned security specialist with over 37 years of experience and serves as the senior security specialist for the Interagency Security Committee (ISC) within the Infrastructure Security Division of the U.S. Department of Homeland Security’s (DHS’) Cybersecurity and Infrastructure Security Agency (CISA). Dunford leads the policies, standards and recommendations line of effort, which is foundational to the work of the ISC and provides a collaborative roadmap to protect federal facilities and those that work and visit them.
Before joining CISA, Dunford was chief of the Field Security Operations Branch for the U.S. Citizenship and Immigration Services. As chief, he led a team of multidisciplined security professionals in implementing physical, administrative and operations security and identity management programs for the agency. He also served in the DHS Physical Security Division, performing security compliance reviews of DHS operational components and playing an instrumental role in developing the nationally recognized ISC Risk Management Process training course. Additionally, Dunford served 25 years in the United States Air Force.
Making a Business Case for Security: A Case Study on How to Create a Compelling Business Case for Obtaining Infrastructure Security Funding
Find out how you can improve your ability to successfully deliver security recommendations to the C-Suite by creating a strong business case for security. Rapid advances in technology and the constant threat of cybercriminals are forcing the convergence of physical security and cybersecurity, requiring both short- and long-term investments.
During this presentation, members of the Interagency Security Committee will describe a nine-step methodology from “Making a Business Case for Security: An Interagency Security Committee Best Practice.” The presentation will demonstrate how to build out an effective cost-benefit analysis, utilize various methods to analyze security costs and design cost-effective solutions. The cost-benefit analysis will be demonstrated in the form of a real-world case study that will bring these techniques to life.